Complete the code to identify the key used only by sender and receiver.
The message is encrypted using the [1] key before sending.The shared key is known only to sender and receiver, ensuring confidentiality.
Complete the code to specify the encryption method that ensures only sender and receiver can read the message.
End-to-end encryption uses [1] encryption to secure messages.Symmetric encryption uses the same key for encryption and decryption, suitable for end-to-end encryption.
Fix the error in the statement about who can decrypt the message.
Only the [1] can decrypt the message in end-to-end encryption.
In end-to-end encryption, only the sender and receiver have the keys to decrypt the message.
Fill both blanks to complete the description of the encryption process.
The sender uses the [1] key to encrypt the message, and the receiver uses the [2] key to decrypt it.
Both sender and receiver use the same shared key to encrypt and decrypt messages in end-to-end encryption.
Fill all three blanks to complete the explanation of key exchange and encryption.
The [1] key is exchanged securely using [2] encryption, then used for [3] encryption of messages.
The session key is exchanged securely using asymmetric encryption, then used for symmetric encryption of messages for efficiency and security.
